[go: up one dir, main page]

0% found this document useful (0 votes)
271 views10 pages

Networking Concepts

The document discusses networking concepts, defining a computer network as an interconnection of computers that can exchange information. It outlines the goals and advantages of networking, such as resource sharing, reliability, and cost-effectiveness, and describes the evolution of networking from ARPANET to the Internet. Additionally, it covers types of networks (LAN, WAN, MAN), network topologies, applications in networking, and security measures to protect networks.

Uploaded by

pawarvidu23
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
271 views10 pages

Networking Concepts

The document discusses networking concepts, defining a computer network as an interconnection of computers that can exchange information. It outlines the goals and advantages of networking, such as resource sharing, reliability, and cost-effectiveness, and describes the evolution of networking from ARPANET to the Internet. Additionally, it covers types of networks (LAN, WAN, MAN), network topologies, applications in networking, and security measures to protect networks.

Uploaded by

pawarvidu23
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Chapter 15- Networking Concepts II PUC, MDRPUC, Hassan

NETWORK ING CONCEPTS


 A computer network is a interconnection of two or more computers that are able to exchange
information’s.
 Two computers are said to be inter connected if they are capable of exchanging information.

 Network Goals/Advantages of Networking:


 Resource Sharing:
o The aim is to make all programs, data and peripherals available to anyone on the
network irrespective of the physical location of the resources and the user.
 Reliability:
o A file can have copies on two or three different machines, so if one of them is unavailable
(hardware crash), the other copies could be used.
o For military, banking, air reservation and many other applications it is of great
importance.
 Cost Factor:
o Personal computers have better price/performance ratio than micro computers.
o So it is better to have PC's, one per user, with data stored on one shared file server
machine.
 Communication Medium.
o Using a network, it is possible for managers, working far apart, to prepare financial report
of the company.
o The changes at one end can be immediately noticed at another and hence it speeds up co-
operation among them.

 Need of Networking:
 File sharing provides sharing and grouping of data files over the network.
 Printing sharing of computer resources such as hard disk and printers etc.
 E-mail tools for communication with the e-mail address.
 Remote access able to access data and information around the globe.
 Sharing the database to multiple users at the same time by ensuring the integrity.
 Evolution of Networking:
 In 1969 U.S. Department of Defense sponsored a project named ARPANET (Advanced
Research Projects Agency Network).
 The goal of the project was to connect various universities and US Defense.

1|Page Keerthi Kumar H


M
Chapter 15- Networking Concepts II PUC, MDRPUC, Hassan
 In mid 80’s National Science Foundation created a new high capacity network called NSFnet,
which was more powerful than ARPANET.
 In 1990 the Internet came into picture.

 Internet:
 The internet is worldwide network of computer network evolved from the first network
ARPANET.
 Internet is an interconnection of large and small networks around the globe.
 The common use of internet standards allows users connected to one network to communicate
with users on another network.

 Interspace:
 Interspace is a client/server software program that allows multiple users to communicate
online with real-time audio, video and text chat in dynamic 3D environments.
 Interspace provides the most advanced form of communication available on the Internet
today.

 Elementary Terminology of Networks:


1. Nodes (Workstations):
 The term nodes refer to the computers that are attached to a network and are seeking to
share the resources of the network.
 Of course, if there were no nodes (also called workstations), there would be no network at
all.
2. Server:
 A Server is also a computer that facilitates the sharing of data, software, and hardware
resources like printers, modems etc on the network.
 Servers can be of two types:
i. Non-dedicated servers ii. Dedicated servers
 Non-dedicated Servers:
 On small networks, a workstation that can double up as a server is known as non-
dedicated server since it is not completely dedicated to the cause of serving.

 Such servers can facilitate the resource-sharing among workstations on a proportionately


smaller scale.

2|Page Keerthi Kumar H


M
Chapter 15- Networking Concepts II PUC, MDRPUC, Hassan
 Since one computer works as a workstation as well as server, it is slower and requires more
memory.
 The (small) networks using such a server are known as PEER-TO-PEER networks.

 Dedicated Servers:
 On bigger network installations, there is a computer reserved for server's job and its only job
is to help workstations access data, software and hardware resources.
 It does not double-up as a workstation and such a server is known as dedicated server.
 The networks using such a server are known as MASTER-SLAVE networks.

 On a network, there may be several servers that allow workstations to share specific
resources. For example, file server, printer server and modem server.

3. Network Interface Unit (NIU) :


 A Network Interface Unit is an interpreter that helps establish communication between the
server and workstations.
 The NIU is also called Terminal Access Point (TAP).

4. MAC address:
 The MAC address refers to the physical address assigned by NIC manufacturer.

 Types of network:
 A computer network means a group of networked components, i.e., computers are linked by
means of a communication system.
 There are three types of network.
o Local Area Network (LAN)
o Wide Area Network (WAN)
o Metropolitan Area Network (MAN)
 Local Area Network:
 Privately owned small networks that are confined to a localized area (e.g., an office, a building
or a factory) are known as Local Area Networks (LANs).
 The key purpose of a LAN is to serve its users in resource sharing.
 The hardware as well as software resources are shared through LANs.
 LAN users can share data, information, programs, printers, hard disk, modems, etc.
 It is fast with speed from 10 MBPS to 10 GBPS.
 LAN Configuration consists of:

3|Page Keerthi Kumar H


M
Chapter 15- Networking Concepts II PUC, MDRPUC, Hassan
o A File Server: Stores all of the software that controls the network, as well as the software
that can be shared by the computers attached to the network.
o A Workstation: Computers connected to the file server. These are less powerful than the
file server.
o Cables: Used to connect the network interface cards on each computer.

 Metropolitan Area Network (MAN)


 Metropolitan Area Network is the networks spread over a city.
 MAN typically covers an area of between 5 and 50 KM.
 The purpose of a MAN is also the sharing of hardware and software resources among its users.

 For example, cable TV networks that are spread over a city can be termed as metropolitan area
networks.

 Wide Area Network (WAN)


 The networks spreads across countries are known as WANs.
 A wide Area Network (WAN) is a group of computers that are separated by large distances and
tied together.
 The largest WAN in existence is the internet.
 It can even be a group of LAN that are spread across several locations and connected and
together to look like one big LAN.
 The WANs link computers to facilitate fast and efficient exchange of information at lesser
costs and higher speeds.

 Difference between LAN and WAN


Sl No LAN WAN
1 Local Area Network Wide Area Network
2 Diameter of not more than a few kilometre Span entire country
3 A total data rate of at least several mbps Data rate is less compared to LAN
4 Complete ownership by a single organization Owned by multiple organization
5 Very low error rates Comparatively high error rates.

 Network Topologies
4|Page Keerthi Kumar H
M
Chapter 15- Networking Concepts II PUC, MDRPUC, Hassan
 Network Topology refers to the arrangement of computers and other devices in a network.
 Need for Topologies are: Cost, Flexibility, and Reliability.
 Network topologies can be classified as follows:
1. Bus Topology
2. Star Topology
3. Ring Topology
4. Mesh Topology
5. Hybrid Topology

 Linear or bus Topology:


 A linear bus topology consists of a main run of cable with a terminator at each end.
 All nodes (file server, workstations, and peripherals) are connected to the linear cable.

 In the bus network topology, every workstation is connected to a main cable called the bus.
 Therefore, in effect, each workstation is directly connected to every other workstation in the
network.
 Advantages of a Linear Bus Topology
o Easy to connect a computer or
peripheral to a linear bus.
o Requires less cable length than a star
topology.
 Disadvantages of a Linear Bus Topology
o Entire network shuts down if there is a break in the main cable.
o Terminators are required at both ends of the backbone cable.
o Difficult to identify the problem if the entire network shuts down.
o Not meant to be used as a stand-alone solution in a large building.

 Star Topology
 In this type of topology, all the computers are connected to a single
hub or a switch through a cable. This hub is the central node and all
others nodes are connected to the central node.
 Advantages of a Star Topology
o Easy to install and wire.
o No disruptions to the network when connecting or removing
devices.
5|Page Keerthi Kumar H
M
Chapter 15- Networking Concepts II PUC, MDRPUC, Hassan
o Easy to detect faults.
 Disadvantages of a Star Topology
o Requires more cable length than a linear topology.
o If the hub, switch, or concentrator fails, nodes attached are disabled.
o More expensive than linear bus topologies because of the cost of the hubs, etc.

 Ring topology
 In a ring topology, all computers are connected via cable that loops in a ring or circle.
 A ring topology is a circle that has no start and no end.
 Each node connected to two neighboring computers.
 Data accepted from one node transmitted to another.
 Data travels in one direction, from the node to node around the ring.
 Signal amplified at each node before being passed.

 Advantages of Ring Topology


o Short cable length
o No wiring closet space required
o Suitable for optical fibers.
o Each client has equal access to resources.
 Disadvantages
o Node failure causes network failure
o Difficult to diagnose faults
o Network reconfiguration is difficult

 Tree Topology:
 A tree topology combines characteristics of linear bus and star topologies.
 It consists of groups of star-configured workstations connected to a linear bus backbone cable.
 The tree network topology uses two or more star networks
connected together.
 The central computers of the star networks are connected to
a main bus. Thus, a tree network is a bus network of star
networks.

6|Page Keerthi Kumar H


M
Chapter 15- Networking Concepts II PUC, MDRPUC, Hassan
 Best suited for applications having hierarchical flow of data
and control.
 Advantages of a Tree Topology
o Point-to-Point wiring for individual segments.
o Supported by several hardware and software venders.
o Network can be easily extended.
 Disadvantages of a Tree Topology
o Use large cable length.
o If the backbone line breaks, the entire segment goes down.
o More difficult to configure and wire than other topologies.

 Mesh Topology:
 In this topology each node is connected to two or more than two
nodes.
 It is a point-to-point connection to other nodes or devices.
 Traffic is carried only between two devices or nodes to which it
is connected.
 This topology is robust, provides security and privacy.

 Overall cost of this network is too high.

 Applications in Networking:

 SMS:
 Short Message Service (SMS) is the transmission of short text messages to and from a mobile
phone, fax machine and/or IP address.
 Messages must be no longer than some fixed number of alpha-numeric characters and contain
no images or graphics.
 E-mail:
 Electronic mail (e-mail) is sending and receiving message by computer.
 Advantages:
o Low cost: Electronic mail is an extremely cost-effective way to move information
around, especially when it must be moved quickly.
o Speed: Electronic mail can be delivered almost as fast as the wire can carry it.
 Voice Mail:
7|Page Keerthi Kumar H
M
Chapter 15- Networking Concepts II PUC, MDRPUC, Hassan
 The voice-mail refers to e-mail systems that support audio.
 Users can leave spoken messages for one another and listen to the messages by executing the
appropriate command in the e-mail system.
 Chat:
 Chatting is the most fantastic thing on Internet.
 Chatting is like a text-phone.
 In telephonic conversations, you say something, people hear it and respond, and you hear their
responses on the spot and can reply instantly.
 Video Conferencing:
A two-way videophone conversation among multiple participations is called Video Conferencing
 Network Security:
 Network security consists of the provisions and policies adopted by a network administer to
prevent and monitor unauthorized access, misuse, modification of a computer network and
network accessible resources.
 The problem encountered under network security are:
1. Physical Security holes: When individuals gain unauthorized physical access to a computer
and tamper with files.
2. Software Security holes: When badly written programs or privileged software are
compromised into doing things that they shouldn’t be doing.

3. Inconsistent usage holes: When a system administrator assembles a combination of hardware


and software such that the system is seriously flawed from a security point of view.

 Protection Methods:
1. Authorization - Authorization is performed by asking the user a legal login ID. If the user is
able to provide a legal login ID, He/she is considered an authorized user.
2. Authentication - Authentication also termed as password protection as the authorized user is
asked to provide a valid password and if he/she is able to do this, he/she considered to be an
authentic user.
3. Encryption Smart cards– conversion of the form of data from one form to another form. An
encrypted smart card is a hand held smart card that can generate a token that a computer
system can recognize. Every time a new and different token is generated, which even though
carked or hacked, cannot be used later.
4. Biometric System – It involves unique aspect of a person's body such as Finger-prints, retinal
8|Page Keerthi Kumar H
M
Chapter 15- Networking Concepts II PUC, MDRPUC, Hassan
patterns etc to establish his/her Identity.
5. Firewall - A system designed to prevent unauthorized access to or from a private network is
called firewall. It can be implemented in both hardware and software or combination or both.

Interconnection networks, also called multi-stage interconnection networks (or MINs), are high-
speed computer networks. They're connections between nodes where each node can be a single
processor or a group of processors or memory modules.

Types of interconnection
Interconnection involves various methods of linking systems, networks, and devices to exchange
data and resources. It encompasses multiple forms like physical, network, system, and direct
interconnections, each with its purpose and benefits.

Physical interconnection
Physical interconnection refers to the direct and tangible linking of separate physical networks,
typically through cables, ports, and routers. This form of connection facilitates the direct transfer of
data between different networks or devices without relying on the public internet.

Network interconnection
Network interconnection is the process of connecting disparate networks to enable data exchange
and communication between them. This practice is fundamental in creating a larger, more efficient
network system, allowing for seamless data flow and interaction across different network
infrastructures and enhancing overall connectivity and access to resources.

System interconnection
System interconnection involves linking various computing systems, both hardware and software, to
allow them to work together and share information. This interconnected network of systems
enhances functionality, enables better data integration, and improves overall system efficiency,
which is crucial for complex IT environments.

Direct interconnection
Direct interconnection is the establishment of a physical and direct link between two distinct IT
systems or networks. This type of interconnection bypasses the public internet, offering a more
9|Page Keerthi Kumar H
M
Chapter 15- Networking Concepts II PUC, MDRPUC, Hassan

secure, reliable, and high-speed pathway for data transfer, crucial for sensitive or high-volume data
exchanges.

10 | P a g Keerthi Kumar H
e M

You might also like